Wes Lambert Profile picture
Lead Engineer, NSM @Target Github: https://t.co/tmQk6TbWMr https://t.co/5KDnHsdBlV Mastodon: @weslambert@infosec.exchange

Sep 25, 2022, 5 tweets

One might use this artifact to generate a baseline of normal Windows services, and look for services out of the ordinary. We can filter on display/service name, as well as DLL, path, etc. We can also calculate hashes and provide signing info for associated executables/DLLs.

Sorting on the 'Created' column shows the most recently created services (assuming no other manipulation, etc.). Here, we see a service named 'win32times', similar to the native Windows Time Service. We also see 'evilscript.ps1' being called by 'cmd', and no signing info.🦹🔍

Adversaries may attempt to give services/tasks names that are similar or identical to those of legitimate ones make it appear legitimate or benign (T1036.004).

From here, we could dive into 'evilscript.ps1' and/or other associated activity using other artifacts and techniques.

That's it for now. Stay tuned to learn about more artifacts! 🦖

Share this Scrolly Tale with your friends.

A Scrolly Tale is a new way to read Twitter threads with a more visually immersive experience.
Discover more beautiful Scrolly Tales like this.

Keep scrolling